1 Introduction to Game Theory

Size: px
Start display at page:

Download "1 Introduction to Game Theory"

Transcription

1 15-451/651: Design & Analysis of Algorithms October 12, 2015 Lecture #12: Game Theory last changed: October 9, 2015 In today s lecture, we ll talk about game theory and some of its connections to comuter science. The toics we ll cover are: 2-layer Zero-sum games, and the concet of (minimax) otimal strategies. The connection of 2-layer zero-sum games to randomized algorithms. And time ermitting, general sum-games, and the idea of a Nash euilibrium. 1 Introduction to Game Theory Game theory is the study of how eole behave in social and economic interactions, and how they make decisions in these settings. It is an area originally develoed by economists, but given its general scoe, it has alications to many other discilines, including comuter science. A clarification at the very beginning: a game in game theory is not just what we traditionally think of as a game (chess, checkers, oker, tennis, or football), but is much more inclusive a game is any interaction between arties, each with their own interests. And game theory studies how these arties make decisions during such interactions. 1 Since we very often build large systems in comuter science, which are used by multile users, whose actions affect the erformance of all the others, it is natural that game theory would lay an imortant role in many CS roblems. For examle, game theory can be used to model routing in large networks, or the behavior of eole on social networks, or auctions on Ebay, and then to make ualitative/uantitative redictions about how eole would behave in these settings. In fact, the two areas (game theory and comuter science) have become increasingly closer to each other over the ast two decades the interaction being a two-way street with game-theorists roving results of algorithmic interest, and comuter scientists roving results of interest to game theory itself. 2 Some Definitions and Examles In a game, we have A collection of articiants, often called layers. Each layer has a set of choices, called actions, from which layers choose about how to lay (i.e., behave) in this game. Their combined behavior leads to ayoffs (think of this as the hainess or satisfaction level ) for each of the layers. Let us look at some examles: all of these basic examles have only two layers which will be easy to icture and reason about. 2.1 The Shooter-Goalie Game This game abstracts what haens in a game of soccer, when some team has a enalty shot. There are two layers in this game. One called the shooter, the other is called the goalie. Hence this is a 1 Robert Aumann, Nobel rize winner, has suggested the term interactive decision theory instead of game theory. 1

2 2-layer game. The shooter has two choices: either to shoot to her left, or shoot to her right. The goalie has two choices as well: either to dive to the shooter s left, or to the shooter s right. Hence, in this case, both the layers have two actions, denoted by the set {L, R}. 2 Now for the ayoffs. If both the shooter and the goalie choose the same strategy (say both choose L, or both choose R) then the goalie makes a save. Note this is an abstraction of the game: for now we assume that the goalie always makes the save when diving in the correct direction. This brings great satisfaction for the goalie, not so much for the shooter. On the other hand, if they choose different strategies, then the shooter scores the goal. (Again, we are modeling a erfect shooter.) This brings much hainess for the shooter, the goalie is disaointed. Being mathematically-minded, suose we say that the former two choices lead to a ayoff of +1 for the goalie, and 1 for the shooter. And the latter two choices lead to a ayoff of 1 for the goalie, and +1 for the shooter. We can write it in a matrix (called the ayoff matrix) thus: ayoff goalie matrix M L R shooter L ( 1, 1) (1, 1) R (1, 1) ( 1, 1) The rows of the game matrix are labeled with actions for one of the layers (in this case the shooter), and the columns with the actions for the other layer (in this case the goalie). The entries are airs of numbers, indicating who wins how much: e.g., the L, L entry contains ( 1, 1), the first entry is the ayoff to the row layer (shooter), the second entry the ayoff to the column layer (goalie). In general, the ayoff is (r, c) where r is the ayoff to the row layer, and c the ayoff to the column layer. In this case, note that for each entry (r, c) in this matrix, the sum r + c = 0. Such a game is called a zero-sum game. The zero-sum-ness catures the fact that the game is urely cometitive. Note that being zero-sum does not mean that the game is fair in any sense a game where the ayoff matrix has (1, 1) in all entries is also zero-sum, but is clearly unfair to the column layer. One more comment: for 2-layer games, textbooks often define the row-ayoff matrix R which consists of the ayoffs to the row layer, and the column-ayoff matrix C consisting of the ayoffs to the column layer. The tules in the ayoff matrix M contain the same information, i.e., M ij = (R ij, C ij ). The game being zero-sum now means that R = C, or R + C = 0. In the examle above, the matrix R is ayoff goalie matrix M L R shooter L 1 1 R Note carefully: we have defined things so that left and right are with resect to the shooter. From now on, when we say the goalie dives left, it should be clear that the goalie is diving to the shooter s left. 2

3 2.2 Pure and Mixed Strategies Now given a game with ayoff matrix M, the two layers have to choose strategies, i.e., decide how to lay. One strategy would be for the row layer to decide on a row to lay, and the column layer to decide on a column to lay. Say the strategy for the row layer was to lay row/ I and the column layer s strategy was to lay column J, then the ayoffs would be given by the tule (R IJ, C IJ ) in location I, J: ayoff R IJ to the row layer, and C IJ to the column layer In this case both layers are laying deterministically. (E.g., the goalie decides to always go left, etc.) A strategy that decides to lay a single action is called a ure strategy. But very often ure strategies are not what we lay. We are trying to comete with the worst adversary, and we may like to hedge our bets. Hence we may use a randomized algorithm: e.g., the layers dive/shoot left or right with some robability, or when laying the classic game of Rock-Paer-Scissors the layer choose one of the otions with some robability. This means the row layer decides on a non-negative real i for each row, such that i i = 1 (this gives a robability distribution over the rows). Similarly, the column layer decides on a i > 0 for each column, such that i i = 1. The robability distributions, are called the mixed strategies for the row and column layer, resectively. And then we look at the exected ayoff V R (, ) := ij Pr[row layer lays i, column layer lays j] = ij i j R ij for the row layer (where we used that the row and column layer have indeendent randomness), and V C (, ) := i j C ij ij for the column layer. This being a two-layer zero-sum game, we know that V R (, ) = V C (, ), so we will just mention the ayoff to one of the layers (say the row layer). For instance, if = (0.5, 0.5) and = (0.5, 0.5) in the shooter-goalie game, then V R = 0, whereas = (0.75, 0.25) and = (0.6, 0.4) gives V R = = Minimax-Otimal Strategies What does the row layer want to do? She wants to find a vector that maximizes the exected ayoff to her, over all choices of the oonent s strategy. The mixed strategy that maximizes the minimum ayoff. I.e., the row layer wants to find Make sure you arse this correctly: lb := max min V R(, ) mixed strategy that maximizes the minimum exected ayoff {}}{ lb := max min V R (, ) }{{} ayoff when oonent lays her otimal strategy against our choice Loosely, this much ayoff the row layer can guarantee to herself no matter what the column layer does. The uantity lb is a lower bound on the row-layer s ayoff. 3

4 What about the column layer? She wants to find some that maximizes her own exected ayoff, over all choices of the oonent s strategy. She wants to otimize max min V C(, ) But this is a zero-sum game, so this is the same as max min ( V R(, )) And ushing the negative sign through, we get the column layer is trying to otimize her own worst-case ayoff, which is min max V R(, ) So the ayoff in this case to the row layer is ub := min max V R(, ) The column layer can guarantee that the row layer does not get more than this much ayoff, no matter what the row-layer does. This is an uer bound on the row layer s ayoff. We have two uantities: lb and ub. How do they comare? To figure this out, we first make a simle but imortant observation: suose we want to find the row layer s minimax-otimal strategy. Then we can assume that the column layer lays a ure strategy (a single column). Why? Once the row layer fixes a mixed strategy, the column layer then has no reason to randomize: her ayoffs will be some average of the ayoffs from laying the individual columns, so she can just ick the best column for her. In other words, we get that the uantity ub can be euivalently defined as lb = max Similarly, the column layer wants to otimize ub = min max i The Balanced Game Examle j min j i R ij. j R ij = max i min i j C ij. For the shooter-goalie game, we claim that the minimax-otimal strategies for both layers is (0.5, 0.5). How to calculate this? Row Player: For the row layer (shooter), suose = ( 1, 2) is the mixed strategy. Note that 1 0, 2 0 and = 1. So it is easier to write the strategy as = (, 1 ) with [0, 1]. OK. If the column layer (goalie) lays L, then this strategy gets the shooter a ayoff of ( 1) + (1 ) (1) = 1 2. If the column layer (goalie) lays R, then this strategy gets the shooter a ayoff of (1) + (1 ) ( 1) = 2 1. So we want to choose some value [0, 1] to maximize lb = min(1 2, 2 1) In this case, this maximum is achieved at = 1/2. (One way to see it is by drawing these two lines.) And the minimax-otimal exected ayoff to the shooter is 0. Column Player: The calculation for the column layer (goalie) is very similar in this case. The minimax-otimal strategy for the goalie is also (0.5, 0.5) and the guarantees that the shooter cannot make more than 0 ayoff. 4 j

5 An observation: the shooter can guarantee a ayoff of lb = 0, and the goalie can guarantee that the shooter s ayoff is never more than ub = 0. Since lb = ub, in this case the value of the game is said to be lb = ub = The Asymmetric Goalie Examle Let s change the game slightly. Suose the goalie is weaker on the left. What haens if the ayoff matrix is now: L R shooter L ( 1 2, 1 2 ) (1, 1) R (1, 1) ( 1, 1) Row Player: For the row layer (shooter), suose = (, 1 ) is the mixed strategy, with [0, 1]. If the column layer (goalie) lays L, then this strategy gets the shooter a ayoff of ( 1/2) + (1 ) (1) = 1 (3/2). If the column layer (goalie) lays R, then this strategy gets the shooter a ayoff of (1) + (1 ) ( 1) = 2 1. So we want to choose some value [0, 1] to maximize lb = min(1 (3/2), 2 1) In this case, this maximum is achieved at = 4/7. And the minimax-otimal exected ayoff to the shooter is 1/7. Note that the goalie being weaker means the shooter s ayoff increases. Column Player: What about the calculation for the column layer (goalie)? If her strategy is = (, 1 ) with [0, 1], then if the shooter lays L then the shooter s ayoff is ( 1/2) + (1 ) (1) = 1 (3/2). If she lays R, then it is 2 1. So the goalie will try to minimize ub = max(1 (3/2), 2 1) which will again give (4/7, 3/7) and guarantees that the exected loss is never more than 1/7. Again, the shooter guarantees a ayoff of lb = 1/7, and the goalie can guarantee that the shooter s ayoff is never more than ub = 1/7. In this case the value of the game is said to be lb = ub = 1/7. Exercise 1: What if both layers have somewhat different weaknesses? What if the ayoffs are: (-1/2, 1/2) (3/4, -3/4) (1, -1) (-3/2, 3/2) Show that minimax-otimal strategies are = (2/3, 1/3), = (3/5, 2/5) and value of game is 0. Exercise 2: For the game with ayoffs: (-1/2, 1/2) (3/4, -3/4) (1, -1) (-2/3, 2/3) Show that minimax-otimal strategies are = ( 4, 3 17 ), = (, 18 ) and value of game is Exercise 3: For the game with ayoffs: (-1/2, 1/2) (-1, 1) (1, -1) (2/3, -2/3) Show that minimax-otimal strategies are = (0, 1), = (0, 1) and value of game is

6 3 Von Neumann s Minimax Theorem In all the above examles of 2-layer zero-sum games, we saw that the row layer has a strategy that guarantees some ayoff lb for her, no matter what strategy the column layer lays. And the column layer has a strategy that guarantees that the row layer cannot get ayoff more than ub, no matter what strategy the row layer lays. The remarkable fact in the examles was that lb = ub in all these cases! Was this just a coincidence? No: a celebrated result of von Neumann 3 shows that we always have lb = ub in (finite) 2-layer zero-sum games. Theorem 1 (Minimax Theorem (von Neumann, 1928)) Given a finite 2-layer zero-sum game with ayoff matrices R = C, lb = max min V R(, ) = min This common value is called the value of the game. max V R(, ) = ub. The theorem imlies that in a zero-sum game, both the row and column layers can even ublish their minimax-otimal mixed strategies (i.e., tell the strategy to the other layer), and it does not hurt their exected erformance as long as they lay otimally. 4 Von Neumann s Minimax Theorem is an imortant result in game theory, but it has beautiful imlications to comuter science as well as we see in the next section. 4 Lower Bounds for Randomized Algorithms In order to rove lower bounds, we thought of us coming u with algorithms, and the adversary coming with some inuts on which our algorithm would erform oorly take a long time, or make many comarisons, etc. We can encode this as a zero-sum game with row-layer ayoff matrix R. (Kee sorting as an examle alication in your mind.) The columns are various algorithms for the roblem (for sorting n elements). The rows are all the ossible inuts (all n! of them). The entry R ij is the cost of the algorithm j on the inut i (say the number of comarisons). This may be a huge matrix, but we ll never write it down. It s just a concetual guide. But what does the matrix tell us? A lot, as it turns out: A deterministic algorithm with good worst-case guarantee is a column that does well against all rows: all entries in this column are small. A randomized algorithm with good exected guarantee is a robability distribution over columns, such that the exected cost for each row i is small. This is a mixed strategy for the column layer. It gives an uer bound. 3 John von Neumann, mathematician, hysicist, and olymath. 4 It s like telling your rock-aer-scissors oonent that you will lay each action with eual robability, it does not buy them anything to know your strategy. This is not true in general non-zero-sum games; there if you tell your oonent the mixed-strategy you re laying, she may be able to do better. Note carefully that you are not telling them the actual random choice you will make, just the distribution from which you will choose. 6

7 Ideally we want to find the minimax-otimal distribution achieving the value of this game. This would be the best randomized algorithm. What is a lower bound for randomized algorithm? It is a mixed-strategy (a robability distribution over the inuts) such that for every algorithm j, the exected cost of j (under distribution ) is high. So to rove a lower bound for randomized algorithms, if suffices to show that lb is high for this game. I.e., give a strategy for the row layer (a distribution over inuts) such that every column (deterministic algorithm) incurs a high cost on it. 4.1 A Lower Bound for Sorting Algorithms Recall from Lecture #2 we showed that any deterministic comarison-based sorting algorithm must erform log 2 n! = n lg n O(n) comarisons in the worst case. The next theorem extends this result to randomized algorithms. Theorem 2 Let A be any randomized comarison-based sorting algorithm (that always oututs the correct answer). Then there exist inuts on which A erforms Ω(lgn!) comarisons in exectation. Proof: Suose we construct a matrix R as above, where the columns are ossible (deterministic) sorting algorithms for n elements, the rows are the n! ossible inuts, and entry R ij is the number of comarisons algorithm j makes on inut i. We claim that the value of this game is Ω(lg n!): this imlies that the best distribution over columns (i.e., the best randomized algorithm) must suffer at least this much cost on some column (i.e., inut). To show the value of the game is large, we show a robability distribution over the columns (i.e., inuts) such that the exected cost of every row (i.e., deterministic algorithm) is Ω(lg n!). This robability distribution is the uniform distribution: each of the n! inuts is eually likely. Now consider any deterministic algorithm: as in Lecture #2, this is a decision tree with at least n! leaves. No two inuts go to the same leaf. In this tree, how many leaves can have deth at most (lg n!) 10? At most the number of nodes at deth at most (lg n!) 10 in a binary tree. Which in turn is So (lg n!) n! 1024 n! fraction of the leaves in this tree have deth more than (lg n!) 10. In other words, if we ick a random inut, it will lead to a leaf at deth more than (lg n!) 10 with robability Which gives the exected deth of a random inut to be 0.99((lg n!) 10) = Ω(lg n!). 5 General-Sum Two-Player Games In general-sum games, we don t deal with urely cometitive situations, but cases where there are win-win and lose-lose situations as well. For instance, the coordination game of chicken, a.k.a. what side of the street to drive on? It has the ayoff matrix: Note that we are now using the convention that a layer choosing L is driving on their left. Note that if both layers choose the same side, then both win. And if they choose oosite sides, both crash and lose. (Both layers can choose to drive on the left like Britain, India, etc. or both on the right, like the rest of the world, but they must coordinate. Both these are stable solutions and give a ayoff of 1 to both arties.) 7

8 ayoff Bob matrix M L R Alice L (1, 1) ( 1, 1) R ( 1, 1) (1, 1) Consider another coordination game that we call which movie? Two friends are deciding what to do in the evening. One wants to see Citizen Kane, and the other Dumb and Dumber. They d rather go to a movie together than searately (so the strategy rofiles C, D and D, C have ayoffs zero to both), but C, C has ayoffs (8, 2) and D, D has ayoffs (2, 8). ayoff Bob matrix M C D Alice C (8, 2) (0, 0) D (0, 0) (2, 8) Finally, yet another game is Prisoner s Dilemma (or to ollute or not? ) with the ayoff matrix: ayoff Bob matrix M collude defect Alice collude (2, 2) ( 1, 3) defect (3, 1) (0, 0) 5.1 Nash Euilibria In this case, a good notion is to look for a Nash Euilibrium 5 which is a stable set of (mixed) strategies for the layers. Stable here means that given strategies (, ), neither layer has any incentive to unilaterally switch to a different strategy. I.e., for any other mixed strategy for the row layer row layer s new ayoff = ij i j R ij ij i j R ij = row layer s old ayoff and for any other ossible mixed strategy for the column layer column layer s new ayoff = ij i jc ij ij i j C ij = column layer s old ayoff. Here are some examles of Nash euilibria: In the chicken game, both { = (1, 0), = (1, 0)} and { = (0, 1), = (0, 1)} are Nash euilibria, as is { = ( 1 2, 1 2 ), = ( 1 2, 1 2 )}. In the movie game, the only Nash euilibria are { = (1, 0), = (1, 0)} and { = (0, 1), = (0, 1)}. In risoner s dilemma, the only Nash euilibrium is to defect (or ollute). So we need extra incentives for overall good behavior. 5 Named after John Nash: mathematician and Nobel rize winner. 8

9 It is easy to come u with games where there are no stable ure strategies. The main result in this area was roved by Nash in 1950 (which led to his name being attached to this concet) Theorem 3 (Existence of Stable Strategies) Every finite layer game (each with a finite number of strategies) has at least one Nash euilibrium. This theorem imlies the Minimax Theorem (Theorem 1) as a corollary: indeed, take any twolayer zero-sum game and consider any Nash euilibrium (, ), with value V = ij i j R ij = ij i j C ij. Since this is stable, neither layer can do better by deviating, even knowing the other layer s strategy. So they must be laying minimax-otimal. 9

Randomized algorithms: Two examples and Yao s Minimax Principle

Randomized algorithms: Two examples and Yao s Minimax Principle Randomized algorithms: Two examles and Yao s Minimax Princile Maximum Satisfiability Consider the roblem Maximum Satisfiability (MAX-SAT). Bring your knowledge u-to-date on the Satisfiability roblem. Maximum

More information

Introduction to Algorithms / Algorithms I Lecturer: Michael Dinitz Topic: Algorithms and Game Theory Date: 12/3/15

Introduction to Algorithms / Algorithms I Lecturer: Michael Dinitz Topic: Algorithms and Game Theory Date: 12/3/15 600.363 Introduction to Algorithms / 600.463 Algorithms I Lecturer: Michael Dinitz Topic: Algorithms and Game Theory Date: 12/3/15 25.1 Introduction Today we re going to spend some time discussing game

More information

CS2 Algorithms and Data Structures Note 8

CS2 Algorithms and Data Structures Note 8 CS2 Algorithms and Data Structures Note 8 Heasort and Quicksort We will see two more sorting algorithms in this lecture. The first, heasort, is very nice theoretically. It sorts an array with n items in

More information

Lecture 8: Orthogonal Range Searching

Lecture 8: Orthogonal Range Searching CPS234 Comutational Geometry Setember 22nd, 2005 Lecture 8: Orthogonal Range Searching Lecturer: Pankaj K. Agarwal Scribe: Mason F. Matthews 8.1 Range Searching The general roblem of range searching is

More information

CSE 203A: Randomized Algorithms

CSE 203A: Randomized Algorithms CSE 203A: Randomized Algorithms (00:30) The Minimax Principle (Ch 2) Lecture on 10/18/2017 by Daniel Kane Notes by Peter Greer-Berezovsky Game Tree Evaluation (2.1) - n round deterministic 2-player game

More information

CAP 5993/CAP 4993 Game Theory. Instructor: Sam Ganzfried

CAP 5993/CAP 4993 Game Theory. Instructor: Sam Ganzfried CAP 5993/CAP 4993 Game Theory Instructor: Sam Ganzfried sganzfri@cis.fiu.edu 1 Announcements HW 1 due today HW 2 out this week (2/2), due 2/14 2 Definition: A two-player game is a zero-sum game if for

More information

Lecture 18. Today, we will discuss developing algorithms for a basic model for parallel computing the Parallel Random Access Machine (PRAM) model.

Lecture 18. Today, we will discuss developing algorithms for a basic model for parallel computing the Parallel Random Access Machine (PRAM) model. U.C. Berkeley CS273: Parallel and Distributed Theory Lecture 18 Professor Satish Rao Lecturer: Satish Rao Last revised Scribe so far: Satish Rao (following revious lecture notes quite closely. Lecture

More information

Sensitivity Analysis for an Optimal Routing Policy in an Ad Hoc Wireless Network

Sensitivity Analysis for an Optimal Routing Policy in an Ad Hoc Wireless Network 1 Sensitivity Analysis for an Otimal Routing Policy in an Ad Hoc Wireless Network Tara Javidi and Demosthenis Teneketzis Deartment of Electrical Engineering and Comuter Science University of Michigan Ann

More information

On the Computational Complexity of Nash Equilibria for (0, 1) Bimatrix Games

On the Computational Complexity of Nash Equilibria for (0, 1) Bimatrix Games On the Computational Complexity of Nash Equilibria for (0, 1) Bimatrix Games Bruno Codenotti Daniel Štefankovič Abstract The computational complexity of finding a Nash equilibrium in a nonzero sum bimatrix

More information

STRONG / WEAK EDGE VERTEX MIXED DOMINATION NUMBER OF A GRAPH

STRONG / WEAK EDGE VERTEX MIXED DOMINATION NUMBER OF A GRAPH IJMS, Vol. 11, No. 3-4, (July-December 2012),. 433-444 Serials Publications ISSN: 0972-754X STRONG / WEAK EDGE VERTEX MIXED DOMINATION NUMBER OF A GRAPH R. S. Bhat, S. S. Kamath & Surekha R. Bhat Abstract:

More information

Linear Programming: Introduction

Linear Programming: Introduction CSC 373 - Algorithm Design, Analysis, and Complexity Summer 2016 Lalla Mouatadid Linear Programming: Introduction A bit of a historical background about linear programming, that I stole from Jeff Erickson

More information

I ACCEPT NO RESPONSIBILITY FOR ERRORS ON THIS SHEET. I assume that E = (V ).

I ACCEPT NO RESPONSIBILITY FOR ERRORS ON THIS SHEET. I assume that E = (V ). 1 I ACCEPT NO RESPONSIBILITY FOR ERRORS ON THIS SHEET. I assume that E = (V ). Data structures Sorting Binary heas are imlemented using a hea-ordered balanced binary tree. Binomial heas use a collection

More information

An Efficient Video Program Delivery algorithm in Tree Networks*

An Efficient Video Program Delivery algorithm in Tree Networks* 3rd International Symosium on Parallel Architectures, Algorithms and Programming An Efficient Video Program Delivery algorithm in Tree Networks* Fenghang Yin 1 Hong Shen 1,2,** 1 Deartment of Comuter Science,

More information

Multiple Agents. Why can t we all just get along? (Rodney King) CS 3793/5233 Artificial Intelligence Multiple Agents 1

Multiple Agents. Why can t we all just get along? (Rodney King) CS 3793/5233 Artificial Intelligence Multiple Agents 1 Multiple Agents Why can t we all just get along? (Rodney King) CS 3793/5233 Artificial Intelligence Multiple Agents 1 Assumptions Assumptions Definitions Partially bservable Each agent can act autonomously.

More information

On a Network Generalization of the Minmax Theorem

On a Network Generalization of the Minmax Theorem On a Network Generalization of the Minmax Theorem Constantinos Daskalakis Christos H. Papadimitriou {costis, christos}@cs.berkeley.edu February 10, 2009 Abstract We consider graphical games in which edges

More information

CS2 Algorithms and Data Structures Note 8

CS2 Algorithms and Data Structures Note 8 CS2 Algorithms and Data Structures Note 8 Heasort and Quicksort We will see two more sorting algorithms in this lecture. The first, heasort, is very nice theoretically. It sorts an array with n items in

More information

TD C. Space filling designs in R

TD C. Space filling designs in R TD C Sace filling designs in R 8/05/0 Tyical engineering ractice : One-At-a-Time (OAT design X P P3 P X Main remarks : OAT brings some information, but otentially wrong Eloration is oor : on monotonicity?

More information

A CLASS OF STRUCTURED LDPC CODES WITH LARGE GIRTH

A CLASS OF STRUCTURED LDPC CODES WITH LARGE GIRTH A CLASS OF STRUCTURED LDPC CODES WITH LARGE GIRTH Jin Lu, José M. F. Moura, and Urs Niesen Deartment of Electrical and Comuter Engineering Carnegie Mellon University, Pittsburgh, PA 15213 jinlu, moura@ece.cmu.edu

More information

Lecture 3: Geometric Algorithms(Convex sets, Divide & Conquer Algo.)

Lecture 3: Geometric Algorithms(Convex sets, Divide & Conquer Algo.) Advanced Algorithms Fall 2015 Lecture 3: Geometric Algorithms(Convex sets, Divide & Conuer Algo.) Faculty: K.R. Chowdhary : Professor of CS Disclaimer: These notes have not been subjected to the usual

More information

Using Kullback-Leibler Divergence to Model Opponents in Poker

Using Kullback-Leibler Divergence to Model Opponents in Poker Comuter Poker and Imerfect Information: Paers from the I-14 Worksho Using Kullback-Leibler Divergence to Model Oonents in Poker Jiajia Zhang 1, Xuan Wang, Lin Yao 3, Jingeng Li 1, Xuedong Shen 1 1 Intelligence

More information

A DEA-bases Approach for Multi-objective Design of Attribute Acceptance Sampling Plans

A DEA-bases Approach for Multi-objective Design of Attribute Acceptance Sampling Plans Available online at htt://ijdea.srbiau.ac.ir Int. J. Data Enveloment Analysis (ISSN 2345-458X) Vol.5, No.2, Year 2017 Article ID IJDEA-00422, 12 ages Research Article International Journal of Data Enveloment

More information

Shuigeng Zhou. May 18, 2016 School of Computer Science Fudan University

Shuigeng Zhou. May 18, 2016 School of Computer Science Fudan University Query Processing Shuigeng Zhou May 18, 2016 School of Comuter Science Fudan University Overview Outline Measures of Query Cost Selection Oeration Sorting Join Oeration Other Oerations Evaluation of Exressions

More information

6 Extensive Form Games

6 Extensive Form Games 6 Extensive Form Games 6.1 Example: Representing a Simultaneous 22 Game Alice H HHHH O H HH o Q Bob H QQQ h o HHHH h 2 1 1 2 Figure 1: The Battle of the Sexes in Extensive Form So far we have described

More information

Introduction to Image Compresion

Introduction to Image Compresion ENEE63 Fall 2 Lecture-7 Introduction to Image Comresion htt://www.ece.umd.edu/class/enee63/ minwu@eng.umd.edu M. Wu: ENEE63 Digital Image Processing (Fall') Min Wu Electrical & Comuter Engineering Univ.

More information

REAL NUMBERS. 1.1 Introduction

REAL NUMBERS. 1.1 Introduction REAL NUMBERS 1 REAL NUMBERS 1 1.1 Introduction In Class IX, you began your exloration of the world of real numbers and encountered irrational numbers. We continue our discussion on real numbers in this

More information

CMSC 425: Lecture 16 Motion Planning: Basic Concepts

CMSC 425: Lecture 16 Motion Planning: Basic Concepts : Lecture 16 Motion lanning: Basic Concets eading: Today s material comes from various sources, including AI Game rogramming Wisdom 2 by S. abin and lanning Algorithms by S. M. LaValle (Chats. 4 and 5).

More information

Cross products. p 2 p. p p1 p2. p 1. Line segments The convex combination of two distinct points p1 ( x1, such that for some real number with 0 1,

Cross products. p 2 p. p p1 p2. p 1. Line segments The convex combination of two distinct points p1 ( x1, such that for some real number with 0 1, CHAPTER 33 Comutational Geometry Is the branch of comuter science that studies algorithms for solving geometric roblems. Has alications in many fields, including comuter grahics robotics, VLSI design comuter

More information

Comparison Based Sorting Algorithms. Algorithms and Data Structures: Lower Bounds for Sorting. Comparison Based Sorting Algorithms

Comparison Based Sorting Algorithms. Algorithms and Data Structures: Lower Bounds for Sorting. Comparison Based Sorting Algorithms Comparison Based Sorting Algorithms Algorithms and Data Structures: Lower Bounds for Sorting Definition 1 A sorting algorithm is comparison based if comparisons A[i] < A[j], A[i] A[j], A[i] = A[j], A[i]

More information

Source Coding and express these numbers in a binary system using M log

Source Coding and express these numbers in a binary system using M log Source Coding 30.1 Source Coding Introduction We have studied how to transmit digital bits over a radio channel. We also saw ways that we could code those bits to achieve error correction. Bandwidth is

More information

15-451/651: Design & Analysis of Algorithms October 11, 2018 Lecture #13: Linear Programming I last changed: October 9, 2018

15-451/651: Design & Analysis of Algorithms October 11, 2018 Lecture #13: Linear Programming I last changed: October 9, 2018 15-451/651: Design & Analysis of Algorithms October 11, 2018 Lecture #13: Linear Programming I last changed: October 9, 2018 In this lecture, we describe a very general problem called linear programming

More information

How Bad is Selfish Routing?

How Bad is Selfish Routing? How Bad is Selfish Routing? Tim Roughgarden and Éva Tardos Presented by Brighten Godfrey 1 Game Theory Two or more players For each player, a set of strategies For each combination of played strategies,

More information

Introduction to Parallel Algorithms

Introduction to Parallel Algorithms CS 1762 Fall, 2011 1 Introduction to Parallel Algorithms Introduction to Parallel Algorithms ECE 1762 Algorithms and Data Structures Fall Semester, 2011 1 Preliminaries Since the early 1990s, there has

More information

Algorithms and Data Structures: Lower Bounds for Sorting. ADS: lect 7 slide 1

Algorithms and Data Structures: Lower Bounds for Sorting. ADS: lect 7 slide 1 Algorithms and Data Structures: Lower Bounds for Sorting ADS: lect 7 slide 1 ADS: lect 7 slide 2 Comparison Based Sorting Algorithms Definition 1 A sorting algorithm is comparison based if comparisons

More information

Theoretical Analysis of Graphcut Textures

Theoretical Analysis of Graphcut Textures Theoretical Analysis o Grahcut Textures Xuejie Qin Yee-Hong Yang {xu yang}@cs.ualberta.ca Deartment o omuting Science University o Alberta Abstract Since the aer was ublished in SIGGRAPH 2003 the grahcut

More information

Randomized Selection on the Hypercube 1

Randomized Selection on the Hypercube 1 Randomized Selection on the Hyercube 1 Sanguthevar Rajasekaran Det. of Com. and Info. Science and Engg. University of Florida Gainesville, FL 32611 ABSTRACT In this aer we resent randomized algorithms

More information

COMP260 Spring 2014 Notes: February 4th

COMP260 Spring 2014 Notes: February 4th COMP260 Spring 2014 Notes: February 4th Andrew Winslow In these notes, all graphs are undirected. We consider matching, covering, and packing in bipartite graphs, general graphs, and hypergraphs. We also

More information

Lecture 1: An Introduction to Online Algorithms

Lecture 1: An Introduction to Online Algorithms Algoritmos e Incerteza (PUC-Rio INF979, 017.1) Lecture 1: An Introduction to Online Algorithms Mar 1, 017 Lecturer: Marco Molinaro Scribe: Joao Pedro T. Brandao Online algorithms differ from traditional

More information

Fundamentals of Operations Research. Prof. G. Srinivasan. Department of Management Studies. Indian Institute of Technology, Madras. Lecture No.

Fundamentals of Operations Research. Prof. G. Srinivasan. Department of Management Studies. Indian Institute of Technology, Madras. Lecture No. Fundamentals of Operations Research Prof. G. Srinivasan Department of Management Studies Indian Institute of Technology, Madras Lecture No. # 13 Transportation Problem, Methods for Initial Basic Feasible

More information

22. Swaping: Policies

22. Swaping: Policies 22. Swaing: Policies Oerating System: Three Easy Pieces 1 Beyond Physical Memory: Policies Memory ressure forces the OS to start aging out ages to make room for actively-used ages. Deciding which age to

More information

Truth Trees. Truth Tree Fundamentals

Truth Trees. Truth Tree Fundamentals Truth Trees 1 True Tree Fundamentals 2 Testing Grous of Statements for Consistency 3 Testing Arguments in Proositional Logic 4 Proving Invalidity in Predicate Logic Answers to Selected Exercises Truth

More information

An Efficient Coding Method for Coding Region-of-Interest Locations in AVS2

An Efficient Coding Method for Coding Region-of-Interest Locations in AVS2 An Efficient Coding Method for Coding Region-of-Interest Locations in AVS2 Mingliang Chen 1, Weiyao Lin 1*, Xiaozhen Zheng 2 1 Deartment of Electronic Engineering, Shanghai Jiao Tong University, China

More information

Treaps. 1 Binary Search Trees (BSTs) CSE341T/CSE549T 11/05/2014. Lecture 19

Treaps. 1 Binary Search Trees (BSTs) CSE341T/CSE549T 11/05/2014. Lecture 19 CSE34T/CSE549T /05/04 Lecture 9 Treaps Binary Search Trees (BSTs) Search trees are tree-based data structures that can be used to store and search for items that satisfy a total order. There are many types

More information

Distributed Systems (5DV147)

Distributed Systems (5DV147) Distributed Systems (5DV147) Mutual Exclusion and Elections Fall 2013 1 Processes often need to coordinate their actions Which rocess gets to access a shared resource? Has the master crashed? Elect a new

More information

A Brief Introduction to Truth-Table Logic. Kent Slinker Pima Community College

A Brief Introduction to Truth-Table Logic. Kent Slinker Pima Community College ` A Brief Introduction to ruth-able Logic Kent Slinker Pima Community College Earlier in this class, we learned that all arguments are either valid or invalid. Additionally, we learned that certain valid

More information

5 Graph Theory Basics

5 Graph Theory Basics November 14, 2017 5 Graph Theory Basics William T. Trotter trotter@math.gatech.edu Basic Definitions Definition A graph G is a pair (V, E) where V is a finite set and E is a set of 2-element subsets of

More information

CSE 417 Network Flows (pt 3) Modeling with Min Cuts

CSE 417 Network Flows (pt 3) Modeling with Min Cuts CSE 417 Network Flows (pt 3) Modeling with Min Cuts Reminders > HW6 is due on Friday start early bug fixed on line 33 of OptimalLineup.java: > change true to false Review of last two lectures > Defined

More information

Convex Hulls. Helen Cameron. Helen Cameron Convex Hulls 1/101

Convex Hulls. Helen Cameron. Helen Cameron Convex Hulls 1/101 Convex Hulls Helen Cameron Helen Cameron Convex Hulls 1/101 What Is a Convex Hull? Starting Point: Points in 2D y x Helen Cameron Convex Hulls 3/101 Convex Hull: Informally Imagine that the x, y-lane is

More information

1.5 Case Study. dynamic connectivity quick find quick union improvements applications

1.5 Case Study. dynamic connectivity quick find quick union improvements applications . Case Study dynamic connectivity quick find quick union imrovements alications Subtext of today s lecture (and this course) Stes to develoing a usable algorithm. Model the roblem. Find an algorithm to

More information

Weighted Page Rank Algorithm based on In-Out Weight of Webpages

Weighted Page Rank Algorithm based on In-Out Weight of Webpages Indian Journal of Science and Technology, Vol 8(34), DOI: 10.17485/ijst/2015/v8i34/86120, December 2015 ISSN (Print) : 0974-6846 ISSN (Online) : 0974-5645 eighted Page Rank Algorithm based on In-Out eight

More information

Directed File Transfer Scheduling

Directed File Transfer Scheduling Directed File Transfer Scheduling Weizhen Mao Deartment of Comuter Science The College of William and Mary Williamsburg, Virginia 387-8795 wm@cs.wm.edu Abstract The file transfer scheduling roblem was

More information

Improving Parallel-Disk Buffer Management using Randomized Writeback æ

Improving Parallel-Disk Buffer Management using Randomized Writeback æ Aears in Proceedings of ICPP 98 1 Imroving Parallel-Disk Buffer Management using Randomized Writeback æ Mahesh Kallahalla Peter J Varman Detartment of Electrical and Comuter Engineering Rice University

More information

Secure Multi-Party Computation. Lecture 13

Secure Multi-Party Computation. Lecture 13 Secure Multi-Party Computation Lecture 13 Must We Trust? Can we have an auction without an auctioneer?! Declared winning bid should be correct Only the winner and winning bid should be revealed Using data

More information

8 Matroid Intersection

8 Matroid Intersection 8 Matroid Intersection 8.1 Definition and examples 8.2 Matroid Intersection Algorithm 8.1 Definitions Given two matroids M 1 = (X, I 1 ) and M 2 = (X, I 2 ) on the same set X, their intersection is M 1

More information

1 Linear programming relaxation

1 Linear programming relaxation Cornell University, Fall 2010 CS 6820: Algorithms Lecture notes: Primal-dual min-cost bipartite matching August 27 30 1 Linear programming relaxation Recall that in the bipartite minimum-cost perfect matching

More information

/633 Introduction to Algorithms Lecturer: Michael Dinitz Topic: Priority Queues / Heaps Date: 9/27/17

/633 Introduction to Algorithms Lecturer: Michael Dinitz Topic: Priority Queues / Heaps Date: 9/27/17 01.433/33 Introduction to Algorithms Lecturer: Michael Dinitz Topic: Priority Queues / Heaps Date: 9/2/1.1 Introduction In this lecture we ll talk about a useful abstraction, priority queues, which are

More information

1 A Tale of Two Lovers

1 A Tale of Two Lovers CS 120/ E-177: Introduction to Cryptography Salil Vadhan and Alon Rosen Dec. 12, 2006 Lecture Notes 19 (expanded): Secure Two-Party Computation Recommended Reading. Goldreich Volume II 7.2.2, 7.3.2, 7.3.3.

More information

lecture notes September 2, How to sort?

lecture notes September 2, How to sort? .30 lecture notes September 2, 203 How to sort? Lecturer: Michel Goemans The task of sorting. Setup Suppose we have n objects that we need to sort according to some ordering. These could be integers or

More information

/633 Introduction to Algorithms Lecturer: Michael Dinitz Topic: Sorting lower bound and Linear-time sorting Date: 9/19/17

/633 Introduction to Algorithms Lecturer: Michael Dinitz Topic: Sorting lower bound and Linear-time sorting Date: 9/19/17 601.433/633 Introduction to Algorithms Lecturer: Michael Dinitz Topic: Sorting lower bound and Linear-time sorting Date: 9/19/17 5.1 Introduction You should all know a few ways of sorting in O(n log n)

More information

CHAPTER 2. Graphs. 1. Introduction to Graphs and Graph Isomorphism

CHAPTER 2. Graphs. 1. Introduction to Graphs and Graph Isomorphism CHAPTER 2 Graphs 1. Introduction to Graphs and Graph Isomorphism 1.1. The Graph Menagerie. Definition 1.1.1. A simple graph G = (V, E) consists of a set V of vertices and a set E of edges, represented

More information

Parallel and Sequential Data Structures and Algorithms Lecture (Spring 2012) Lecture 16 Treaps; Augmented BSTs

Parallel and Sequential Data Structures and Algorithms Lecture (Spring 2012) Lecture 16 Treaps; Augmented BSTs Lecture 16 Treaps; Augmented BSTs Parallel and Sequential Data Structures and Algorithms, 15-210 (Spring 2012) Lectured by Margaret Reid-Miller 8 March 2012 Today: - More on Treaps - Ordered Sets and Tables

More information

Near-Optimal Routing Lookups with Bounded Worst Case Performance

Near-Optimal Routing Lookups with Bounded Worst Case Performance Near-Otimal Routing Lookus with Bounded Worst Case Performance Pankaj Guta Balaji Prabhakar Stehen Boyd Deartments of Electrical Engineering and Comuter Science Stanford University CA 9430 ankaj@stanfordedu

More information

15-451/651: Design & Analysis of Algorithms November 4, 2015 Lecture #18 last changed: November 22, 2015

15-451/651: Design & Analysis of Algorithms November 4, 2015 Lecture #18 last changed: November 22, 2015 15-451/651: Design & Analysis of Algorithms November 4, 2015 Lecture #18 last changed: November 22, 2015 While we have good algorithms for many optimization problems, the previous lecture showed that many

More information

Equality-Based Translation Validator for LLVM

Equality-Based Translation Validator for LLVM Equality-Based Translation Validator for LLVM Michael Ste, Ross Tate, and Sorin Lerner University of California, San Diego {mste,rtate,lerner@cs.ucsd.edu Abstract. We udated our Peggy tool, reviously resented

More information

AN INTEGER LINEAR MODEL FOR GENERAL ARC ROUTING PROBLEMS

AN INTEGER LINEAR MODEL FOR GENERAL ARC ROUTING PROBLEMS AN INTEGER LINEAR MODEL FOR GENERAL ARC ROUTING PROBLEMS Philie LACOMME, Christian PRINS, Wahiba RAMDANE-CHERIF Université de Technologie de Troyes, Laboratoire d Otimisation des Systèmes Industriels (LOSI)

More information

Nash equilibria in Voronoi Games on Graphs

Nash equilibria in Voronoi Games on Graphs Nash equilibria in Voronoi Games on Graphs Christoph Dürr, Nguyễn Kim Thắng (Ecole Polytechnique) ESA, Eilat October 07 Plan Motivation : Study the interaction between selfish agents on Internet k players,

More information

Lecture 22 - Oblivious Transfer (OT) and Private Information Retrieval (PIR)

Lecture 22 - Oblivious Transfer (OT) and Private Information Retrieval (PIR) Lecture 22 - Oblivious Transfer (OT) and Private Information Retrieval (PIR) Boaz Barak December 8, 2005 Oblivious Transfer We are thinking of the following situation: we have a server and a client (or

More information

Lecture 22 Tuesday, April 10

Lecture 22 Tuesday, April 10 CIS 160 - Spring 2018 (instructor Val Tannen) Lecture 22 Tuesday, April 10 GRAPH THEORY Directed Graphs Directed graphs (a.k.a. digraphs) are an important mathematical modeling tool in Computer Science,

More information

PREDICTING LINKS IN LARGE COAUTHORSHIP NETWORKS

PREDICTING LINKS IN LARGE COAUTHORSHIP NETWORKS PREDICTING LINKS IN LARGE COAUTHORSHIP NETWORKS Kevin Miller, Vivian Lin, and Rui Zhang Grou ID: 5 1. INTRODUCTION The roblem we are trying to solve is redicting future links or recovering missing links

More information

Computational Complexity and Implications for Security DRAFT Notes on Infeasible Computation for MA/CS 109 Leo Reyzin with the help of Nick Benes

Computational Complexity and Implications for Security DRAFT Notes on Infeasible Computation for MA/CS 109 Leo Reyzin with the help of Nick Benes Computational Complexity and Implications for Security DRAFT Notes on Infeasible Computation for MA/CS 109 Leo Reyzin with the help of Nick Benes The Study of Computational Complexity Let s summarize what

More information

S16-02, URL:

S16-02, URL: Self Introduction A/Prof ay Seng Chuan el: Email: scitaysc@nus.edu.sg Office: S-0, Dean s s Office at Level URL: htt://www.hysics.nus.edu.sg/~hytaysc I was a rogrammer from to. I have been working in NUS

More information

Privacy Preserving Moving KNN Queries

Privacy Preserving Moving KNN Queries Privacy Preserving Moving KNN Queries arxiv:4.76v [cs.db] 4 Ar Tanzima Hashem Lars Kulik Rui Zhang National ICT Australia, Deartment of Comuter Science and Software Engineering University of Melbourne,

More information

princeton univ. F 17 cos 521: Advanced Algorithm Design Lecture 24: Online Algorithms

princeton univ. F 17 cos 521: Advanced Algorithm Design Lecture 24: Online Algorithms princeton univ. F 17 cos 521: Advanced Algorithm Design Lecture 24: Online Algorithms Lecturer: Matt Weinberg Scribe:Matt Weinberg Lecture notes sourced from Avrim Blum s lecture notes here: http://www.cs.cmu.edu/

More information

Game Theory & Networks

Game Theory & Networks Game Theory & Networks (an incredibly brief overview) ndrew Smith ECS 253/ME 289 May 10th, 2016 Game theory can help us answer important questions for scenarios where: players/agents (nodes) are autonomous

More information

Key question: how to set CongestionWindow which, in turn, affects ARQ s sending rate? linear increase/exponential decrease AIMD

Key question: how to set CongestionWindow which, in turn, affects ARQ s sending rate? linear increase/exponential decrease AIMD TCP congestion control Recall: EffectiveWindow = MaxWindow (LastByteSent LastByteAcked) where MaxWindow = min{ AdvertisedWindow, CongestionWindow } Key question: how to set CongestionWindow which, in turn,

More information

Modeling Reliable Broadcast of Data Buffer over Wireless Networks

Modeling Reliable Broadcast of Data Buffer over Wireless Networks JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 3, 799-810 (016) Short Paer Modeling Reliable Broadcast of Data Buffer over Wireless Networs Deartment of Comuter Engineering Yeditee University Kayışdağı,

More information

Order from Chaos. Nebraska Wesleyan University Mathematics Circle

Order from Chaos. Nebraska Wesleyan University Mathematics Circle Order from Chaos Nebraska Wesleyan University Mathematics Circle Austin Mohr Department of Mathematics Nebraska Wesleyan University February 2, 20 The (, )-Puzzle Start by drawing six dots at the corners

More information

4 Fractional Dimension of Posets from Trees

4 Fractional Dimension of Posets from Trees 57 4 Fractional Dimension of Posets from Trees In this last chapter, we switch gears a little bit, and fractionalize the dimension of posets We start with a few simple definitions to develop the language

More information

(Refer Slide Time 04:53)

(Refer Slide Time 04:53) Programming and Data Structure Dr.P.P.Chakraborty Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Lecture 26 Algorithm Design -1 Having made a preliminary study

More information

Order from Chaos. University of Nebraska-Lincoln Discrete Mathematics Seminar

Order from Chaos. University of Nebraska-Lincoln Discrete Mathematics Seminar Order from Chaos University of Nebraska-Lincoln Discrete Mathematics Seminar Austin Mohr Department of Mathematics Nebraska Wesleyan University February 8, 20 The (, )-Puzzle Start by drawing six dots

More information

We will then introduce the DT, discuss some of its fundamental properties and show how to compute a DT directly from a given set of points.

We will then introduce the DT, discuss some of its fundamental properties and show how to compute a DT directly from a given set of points. Voronoi Diagram and Delaunay Triangulation 1 Introduction The Voronoi Diagram (VD, for short) is a ubiquitious structure that aears in a variety of discilines - biology, geograhy, ecology, crystallograhy,

More information

BGP Path visibility issues.

BGP Path visibility issues. BGP Path visibility issues Pierre.Francois@UCLouvain.be ToC ibgp draft-ietf-idr-add-aths Why doing Add-aths draft-ietf-idr-add-aths-guidelines (draft-uttaro-idr-add-aths-guidelines) Why only a small subset

More information

EP2200 Performance analysis of Communication networks. Topic 3 Congestion and rate control

EP2200 Performance analysis of Communication networks. Topic 3 Congestion and rate control EP00 Performance analysis of Communication networks Toic 3 Congestion and rate control Congestion, rate and error control Lecture material: Bertsekas, Gallager, Data networks, 6.- I. Kay, Stochastic modeling,

More information

Probabilistic Visual Cryptography Schemes

Probabilistic Visual Cryptography Schemes The Comuter Journal Advance Access ublished December, 25 The Author 25. Published by Oxford University Press on behalf of The British Comuter Society. All rights reserved. For Permissions, lease email:

More information

COT5405: GEOMETRIC ALGORITHMS

COT5405: GEOMETRIC ALGORITHMS COT5405: GEOMETRIC ALGORITHMS Objects: Points in, Segments, Lines, Circles, Triangles Polygons, Polyhedra R n Alications Vision, Grahics, Visualizations, Databases, Data mining, Networks, GIS Scientific

More information

Diagonalization. The cardinality of a finite set is easy to grasp: {1,3,4} = 3. But what about infinite sets?

Diagonalization. The cardinality of a finite set is easy to grasp: {1,3,4} = 3. But what about infinite sets? Diagonalization Cardinalities The cardinality of a finite set is easy to grasp: {1,3,4} = 3. But what about infinite sets? We say that a set S has at least as great cardinality as set T, written S T, if

More information

Lecture 3: Truth Tables and Logic Gates. Instructor: Joelle Pineau Class web page:

Lecture 3: Truth Tables and Logic Gates. Instructor: Joelle Pineau Class web page: COMP 102: Computers and Computing Lecture 3: Truth Tables and Logic Gates Instructor: (jpineau@cs.mcgill.ca) Class web page: www.cs.mcgill.ca/~jpineau/comp102 Practice example You are given the responsibility

More information

split split (a) (b) split split (c) (d)

split split (a) (b) split split (c) (d) International Journal of Foundations of Comuter Science c World Scientic Publishing Comany ON COST-OPTIMAL MERGE OF TWO INTRANSITIVE SORTED SEQUENCES JIE WU Deartment of Comuter Science and Engineering

More information

Steven Skiena. skiena

Steven Skiena.   skiena Lecture 22: Introduction to NP-completeness (1997) Steven Skiena Department of Computer Science State University of New York Stony Brook, NY 11794 4400 http://www.cs.sunysb.edu/ skiena Among n people,

More information

Crypto-systems all around us ATM machines Remote logins using SSH Web browsers (https invokes Secure Socket Layer (SSL))

Crypto-systems all around us ATM machines Remote logins using SSH Web browsers (https invokes Secure Socket Layer (SSL)) Introduction (Mihir Bellare Text/Notes: http://cseweb.ucsd.edu/users/mihir/cse207/) Cryptography provides: Data Privacy Data Integrity and Authenticity Crypto-systems all around us ATM machines Remote

More information

Advanced Operations Research Prof. G. Srinivasan Department of Management Studies Indian Institute of Technology, Madras

Advanced Operations Research Prof. G. Srinivasan Department of Management Studies Indian Institute of Technology, Madras Advanced Operations Research Prof. G. Srinivasan Department of Management Studies Indian Institute of Technology, Madras Lecture 16 Cutting Plane Algorithm We shall continue the discussion on integer programming,

More information

Introduction to Dynamic Traffic Assignment

Introduction to Dynamic Traffic Assignment Introduction to Dynamic Traffic Assignment CE 392D January 22, 2018 WHAT IS EQUILIBRIUM? Transportation systems involve interactions among multiple agents. The basic facts are: Although travel choices

More information

Building Better Nurse Scheduling Algorithms

Building Better Nurse Scheduling Algorithms Building Better Nurse Scheduling Algorithms Annals of Oerations Research, 128, 159-177, 2004. Dr Uwe Aickelin Dr Paul White School of Comuter Science University of the West of England University of Nottingham

More information

Writing Parallel Programs; Cost Model.

Writing Parallel Programs; Cost Model. CSE341T 08/30/2017 Lecture 2 Writing Parallel Programs; Cost Model. Due to physical and economical constraints, a typical machine we can buy now has 4 to 8 computing cores, and soon this number will be

More information

CPSC 467: Cryptography and Computer Security

CPSC 467: Cryptography and Computer Security CPSC 467: Cryptography and Computer Michael J. Fischer Lecture 4 September 11, 2017 CPSC 467, Lecture 4 1/23 Analyzing Confidentiality of Cryptosystems Secret ballot elections Information protection Adversaries

More information

Applying the fuzzy preference relation to the software selection

Applying the fuzzy preference relation to the software selection Proceedings of the 007 WSEAS International Conference on Comuter Engineering and Alications, Gold Coast, Australia, January 17-19, 007 83 Alying the fuzzy reference relation to the software selection TIEN-CHIN

More information

Horn Formulae. CS124 Course Notes 8 Spring 2018

Horn Formulae. CS124 Course Notes 8 Spring 2018 CS124 Course Notes 8 Spring 2018 In today s lecture we will be looking a bit more closely at the Greedy approach to designing algorithms. As we will see, sometimes it works, and sometimes even when it

More information

Network Topology and Equilibrium Existence in Weighted Network Congestion Games

Network Topology and Equilibrium Existence in Weighted Network Congestion Games Network Topology and Equilibrium Existence in Weighted Network Congestion Games Igal Milchtaich, Bar-Ilan University August 2010 Abstract. Every finite noncooperative game can be presented as a weighted

More information

such a manner that we are able to understand, grasp and grapple with the problem at hand in a more organized fashion.

such a manner that we are able to understand, grasp and grapple with the problem at hand in a more organized fashion. Programming and Data Structure Dr.P.P.Chakraborty Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Lecture 32 Conclusions Hello everybody. Today, we come to the

More information

Complexity Issues on Designing Tridiagonal Solvers on 2-Dimensional Mesh Interconnection Networks

Complexity Issues on Designing Tridiagonal Solvers on 2-Dimensional Mesh Interconnection Networks Journal of Comuting and Information Technology - CIT 8, 2000, 1, 1 12 1 Comlexity Issues on Designing Tridiagonal Solvers on 2-Dimensional Mesh Interconnection Networks Eunice E. Santos Deartment of Electrical

More information

1.2 Adding Integers. Contents: Numbers on the Number Lines Adding Signed Numbers on the Number Line

1.2 Adding Integers. Contents: Numbers on the Number Lines Adding Signed Numbers on the Number Line 1.2 Adding Integers Contents: Numbers on the Number Lines Adding Signed Numbers on the Number Line Finding Sums Mentally The Commutative Property Finding Sums using And Patterns and Rules of Adding Signed

More information